Autonomy European Cyber Security Techniques Necessary for International Threats